Pricing Made for Growing Companies
- Base Price
- Price Per Tenant
- Max Tenants
- First Tenant Free
- Per Tenant Encryption
- Key Leasing Option
- CMK for Amazon S3
- Cloaked Search for Elasticsearch
- Customer Held Keys
- Real-time Audit Trails
- Real-time Security Audit
- On-prem Option
- White Labeling
- B2C Discount
- Community & Docs
- Business Hours
- Contact Us
- Get advanced features and support for larger businesses.
You can also purchase CMK for Amazon S3 separately in the AWS Marketplace.Learn More
SaaS Shield FAQs
Can I try SaaS Shield for free?
What is a tenant?
SaaS applications that serve multiple customers use a multi-tenant architecture. Each tenant is a customer. SaaS Shield is a multi-tenant data security solution, so you will often hear us talking about tenants and customers interchangeably.
What if I have thousands of tenants?
SaaS businesses have a rainbow of business models, and we’re flexible. While customer managed keys might not make sense for each tenant if you have thousands, we’ve worked with customers to add our application layer encryption across the board and then offer CMK to select customers. Contact us to discuss your unique needs.
What payment options do you accept?
Stripe is our go-to for small subscriptions, which means credit cards. Larger subscriptions are invoiced.
What will support include at the different subscription levels?
We have an extensive doc site for free trial users. Pro users receive unlimited business hours support. Enterprise+ users receive white glove 24/7 support.
What is CMK?
Customer Managed Keys, or CMK, is a cloud architecture pattern that gives customers control and ownership of the encryption keys that protect some or all of their data stored in SaaS applications. It also provides customers with an independent audit of data access. CMK is a trust-but-verify model. Data is encrypted and decrypted on the service-side. The SaaS provider is able to access data, but the customer has control over encryption keys.
What is application-layer security?
In a CMK architecture, encryption is performed at the application layer, not the data layer, and data is encrypted using per-tenant keys managed by either the customer or the vendor.